System for providing secure telecommunication access to a computer

- U.S. Philips Corporation

A telecommunication exchange which provides secure access by only authorized terminals to a computer connected to the exchange. The control processor in the central control unit of the exchange is programmed to provide a "call-back" procedure in respone to a request from a terminal for access to the computer. The calling terminal enters by tone or pulse dialing, the address (such as a telephone number) of the computer together with an identification code. The control processor compares such identification code with a list stored therein of authorized identification codes and authorized terminals addresses corresponding thereto. If the identification code is authorized, the control processor causes a confirm signal to be transmitted from the exchange to the requesting terminal signifying to the user of such terminal to release its line, after which a ringing signal is transmitted to the authorized terminal address corresponding to the authorized code. When such authorized terminal then engages its line, the control processor causes the switching network to establish connection of such terminal to the computer. Since the security procedure is provided by the control processor, there is no need for an external security unit and secure access to the computer can be maintained even if call-forwarding facilities are provided by the exchange.

Skip to: Description  ·  Claims  ·  References Cited  · Patent History  ·  Patent History
Description
BRIEF DESCRIPTION OF THE DRAWINGS

A more complete description of a system in accordance with the invention and its advantages is set forth below with reference to the accompanying Figures, in which:

FIG. 1 is a flow-chart of the request part of the "call-back" procedure in accordance with the invention;

FIG. 2 is a flow-chart of the call-back part of such procedure; and

FIG. 3 is a block diagram of a telephone exchange wherein the control processor in the central control unit of such exchange is programmed in accordance with the above flow-charts.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

The block diagram in FIG. 3 shows a telephone exchange in accordance with the invention. A plurality of terminals 1, 2, 3 are connected to the exchange 4. An external computer 5 is also connected to exchange 4. Each terminal is connected to a line circuit 6, 7, 8 in the exchange, which line circuits generate ringing current to the terminal connected thereto under the control of an activating signal. The external computer 5 is connected by a plurality of connecting lines to a plurality of line circuits 9, 10, 11, 12 which constitute the computer ports. The plurality of line circuits is divided into subsets respectively connected to peripheral modules 13, 14 in the exchange and which are connected to a switching network 15 and a central control unit 16. The central control unit 16 contains a receive memory 17 for storing the identification code received from a requesting terminal, an authorization memory 18 for storing a list of authorized identification codes and the telephone numbers of terminals having such codes, and a control processor 19. The control processor 19 executes all control tasks as described hereinafter with reference to FIGS. 1 and 2, in accordance with a program stored in a program store 20 therein.

The request part of the call-back procedure is shown in the flow-chart FIG. 1, the blocks therein having the following meanings:

  ______________________________________                                    
     Block                                                                     
     Number Title        Meaning                                               
     ______________________________________                                    
     1-2    START        begin of the call-back procedure                      
     1-4    B            junction point with all further                       
                         blocks marked "B"                                     
     1-6    INC.CALL     check whether a call is made over                     
                         an exchange subscriber line or over                   
                         a line connecting the exchange to                     
                         another exchange;                                     
     1-8    DIG.DIALL    check whether the caller dials a                      
                         digit;                                                
     1-10   PREF.COMPL.  check whether the first part of the                   
                         number to be dialled (the prefix)                     
                         is complete;                                          
     1-12   EXIST.PREF.  check whether the digit combination                   
                         forming the prefix is a prefix                        
                         indicating that the caller wishes                     
                         to gain access to the computer;                       
     1-14   NORM.PROC.   the exchange follows the normal                       
                         procedure for calls which are not                     
                         intended for the computer;                            
     1-16   DIG.DIALL.   check whether the caller dials a                      
                         further digit;                                        
     1-18   CODE COMPL.  check whether the second part of                      
                         the number to be dialled (the                         
                         identification code) is complete;                     
     1-20   EXIST.CODE   check whether the received code is                    
                         a code existing in the                                
                         authorization memory;                                 
     1-22   SEND REJ.    if the code is not authorized,                        
            TONE         send a reject tone to the caller                      
     1-24   B            junction point with all other                         
                         blocks marked "B";                                    
     1-26   FETCH PROT.  the telephone number of the                           
            DEST.        terminal having the authorized                        
            ENG.LN.CRCT  identification code is being                          
            SEND CONF.   fetched; the line circuit of a                        
            TONE         subscriber line connected to the                      
                         computer is engaged and a confirm                     
                         tone is transmitted to inform the caller              
                         to release the line connection;                       
     1-30   CALL.REL.    check whether the caller has                          
                         released the line connection;                         
     1-32   t > T1       check whether a time T1 has passed                    
                         after the start of a confirm tone;                    
     1-34   REL.         all units used for handling the                       
            RESOURCES    request for a computer connection                     
                         are released, but the engaged line                    
                         circuit to the computer                               
                         remains engaged;                                      
     1-36   C            junction point with all further                       
                         blocks marked "C"                                     
     ______________________________________                                    

The request part of the "call-back" procedure starts with a check whether there is an incoming call (block 1-6). It is assumed that the number transmitted by the user to the exchange consists of two parts: a prefix indicating that the user wishes to gain access to the computer and an identification code in combination with the prefix indicating with which authorized terminal the connection is desired.

After the relevant digits are received it is checked whether it is a prefix for computer access (blocks 1-8, 1-10, 1-12). If this is not the case the normal standard procedure is followed for handling a call (1-14). If it is a prefix for computer access, the subsequent identification code (1-16, 1-18, 1-20) is checked.

If the received identification code does not match one of the stored identification codes, the request is not processed any further by the exchange; this can be made known to the sender by means of a reject signal (1-22). If the identification code is valid the exchange sends a confirm signal to the sender signifying that the line connection should be released. The telephone number of the sending terminal corresponding to the valid code will likewise be fetched and the line circuit of the desired computer port will be reserved for connection to such terminal (1-26).

After the connection to the sender has been released, either by the sender himself (1-30) or after a clock interval T1 in the exchange (1-32), all units associated with the exchange (hardware and software) which were used in the aforesaid procedure are released again. Only the already engaged line circuit to the computer remains in the engaged state.

Subsequently, the call-back part of the "call-back" procedure is executed.

In FIG. 2 is shown a flow-chart representing this procedure. The blocks in this Figure have the following meanings:

  ______________________________________                                    
     Block                                                                     
     Number Title        Meaning                                               
     ______________________________________                                    
     2-2    C            junction point with all further                       
                         blocks marked "C";                                    
     2-4    DEST.INT.    check whether the authorized                          
            PABX         terminal is connected direct to the                   
                         exchange;                                             
     2-6    SET UP       attempt to set up an internal                         
            CONN.INT.    connection between the authorized                     
                         terminal and the already engaged                      
                         line circuit to the computer disregarding any         
                         call-rerouting for that terminal;                     
     2-8    INT.CONN.    check whether the internal                            
            SUCCESF.     connection is set up successfully;                    
     2-10   A            junction point with all further                       
                         blocks marked "A";                                    
     2-12   RING DEST.   send a ringing signal to the                          
                         authorized terminal;                                  
     2-14   ANSWER       check whether the authorized                          
                         terminal answers the call                             
                         (i.e., engages its line);                             
     2-16   t > T2       check whether a time T2 has passed                    
                         after the start of the ringing                        
                         signal to the authorized terminal;                    
     2-20   REL.         all units that were used for                          
            RESOURCES    calling the internal authorized                       
                         terminal are released.                                
     2-22   B            junction point with all further                       
                         blocks marked "B";                                    
     2-24   SET UP       attempt to set up a connection                        
            CONN.EXT     between the (external) authorized                     
                         terminal and the already engaged                      
                         line circuit;                                         
     2-26   EXT.CONN.    check whether the external                            
            SUCCESF.     connection has been set up                            
                         successfully;                                         
     2-28   t > T3 V     check whether a time T3 has passed                    
            BACKW.REL    after the external connection has                     
                         been set up successfully or whether                   
                         the connection was released during                    
                         calling;                                              
     2-30   ANSW.FRM.    check whether the authorized                          
            DEST.        terminal answers the call                             
                         (i.e., engages its line);                             
     2-32   RING PORT    the computer port is called by                        
                         means of a ringing signal;                            
     2-34   ANSWER       check whether the computer port                       
                         answers the call;                                     
     2-36   t > T4       check whether a time T4 has passed                    
                         after the start of the ringing                        
                         signal to the computer port;                          
     2-38   SEND B.T.    a busy tone is sent to the                            
                         authorized terminal;                                  
     2-40   DEST.REL.    check whether the authorized                          
                         terminal has released its line                        
                         connection;                                           
     2-42   t > T5       check whether a time T5 has passed                    
                         after the start of the busy tone to                   
                         the authorized terminal;                              
     2-44   REL.         all units that were used for                          
            RESOURCES    setting up a connection between the                   
                         computer port and the external                        
                         authorized terminal are released;                     
     2-46   B            junction point with all further                       
                         blocks marked "B";                                    
     2-48   SW.THR.CONN. a communication channel is                            
                         established between the computer                      
                         port and the external authorized terminal;            
     2-50   NORM.PABX.   the exchange starts following the                     
                         normal procedure for further                          
                         handling an existing communication                    
                         channel;                                              
     2-52   REL.CONNECT. all exchange units that were used                     
                         to set up the connection are                          
                         released, except for the already                      
                         engaged line circuit of the computer;                 
     2-54   MORE ATTPS.  check whether a new attempt should                    
                         be made to set up a connection;                       
     2-56   REL.         all exchange units that were used                     
            RESOURCES    to set up the connection are                          
                         released;                                             
     2-58   B            junction point with all further                       
                         blocks marked "B";                                    
     2-60   T > T6       check whether a time exceeding                        
                         T6 has passed since the units                         
                         that were used to set up the                          
                         connection were released.                             
     ______________________________________                                    

Claims

1. A telecommunication exchange for controlling the interconnection of an external computer connected thereto to any of a plurality of terminals also connected thereto over telephone lines, interconnection of the computer with a terminal requesting access thereto only being established if such terminals transmits an authorized identification code and has an address in accordance with a predetermined list of authorized identification codes and authorized terminal addresses corresponding thereto; such exchange comprising:

a control processor which includes a receive memory for storing the identification code transmitted by a requesting terminal and an authorization memory for storing said list of authorized identification codes and authorized terminal addresses corresponding thereto;
said control processor being programmed to compare whether the identification code received from a requesting terminal and stored in the receive memory matches an authorized identification code stored in the authorization memory, and if there is such a match to identify the authorized terminal address corresponding to such authorized identification code;
a switching network controlled by said control processor to selectively interconnect any of the terminals connected to said exchange with said computer and to selectively transmit confirm signals and ringing signals to any of such terminals, a confirm signal signifying to a user of a terminal to release its line and a ringing signal signifying to a user of a terminal to engage its line;
said control processor being further programmed to carry out a security procedure such that upon determining that a requesting terminal has an authorized identification code said control processor causes said switching network to
(i) transmit a conform signal to the requesting terminal,
(ii) after the calling terminal line has been released, transmit a ringing signal to the authorized terminal address corresponding to said authorized identification code, and
(iii) after the terminal at the authorized address has engaged its line, interconnect such terminal with said computer.

2. A telecommunication exchange as claimed in claim 1 wherein said control processor includes a program memory for storing a program which controls the operation thereof in accordance with said security procedure, and said authorization memory is included in said program memory.

3. A telecommunication exchange as claimed in claim 1, characterized in that the identification code of a terminal forms part of the address to be dialed by a user of such terminal when requesting access to said computer.

4. A telecommunication exchange as claimed in claim 1, wherein the exchange is adapted to reroute calls directed to an original destination terminal to a designed divert-terminal, and further characterized in that said control processor controls said switching network to provide interconnection of said computer with an original destination terminal in accordance with said security procedure irrespective of the applied rerouting of calls directed to such terminal other than calls for providing interconnection of such terminal with said computer.

5. A process for use in a telephone exchange for controlling the interconnection of an external computer connection thereto to any of a plurality of terminals also connected thereto over telephone lines, interconnection of the computer with a terminal requesting access thereto only being established if such terminal transmits an authorized identification code and has an authorized address in accordance with a predetermined list of authorized identification codes and authorized terminal addresses corresponding thereto; such process comprising:

receiving and storing in a receive memory in said exchange the identification code transmitted by a requesting terminal;
storing in an authorization memory in said exchange said list of authorized identification codes and authorized terminal addresses corresponding thereto;
comparing whether an identification code received from a requesting terminal and stored in the receive memory matches an authorization code stored in the authorization memory, and if there is such a match identifying the authorized terminal address corresponding to such authorized identification code; and
controlling a switching network in said exchange to
(i) transmit a confirm signal to the requesting terminal to signify to a user thereof to release its line,
(ii) after the calling terminal line is released, transmit a ringing signal to the authorized terminal address corresponding to said authorized identification code to signify to a user of such authorization terminal to engage its line, and
(iii) after said authorized terminal has engaged its line, interconnect such terminal with said computer.
Referenced Cited
U.S. Patent Documents
4154988 May 15, 1979 Fechalos et al.
4531023 July 23, 1985 Levine
4785408 November 15, 1988 Britton et al.
4815031 March 21, 1989 Furukawa
Foreign Patent Documents
3329571 March 1985 DEX
Other references
  • "Securing Dial-Up Networks", J. Holmes, Telecommunications, Mar. 1984, pp. 84 and 124. "The AT&T Multi-Mode Voice Systems . . . ", S. D. Hester et al., Proc. of the 1985 AVIOS Conf., Sep. 1985, 12 pages. "New Customer-Defined Network Service", M. Berger et al., Telephony, Mar. 10, 1986, pp. 50, 52, 54, 58 and 60.
Patent History
Patent number: 4922521
Type: Grant
Filed: Mar 8, 1989
Date of Patent: May 1, 1990
Assignee: U.S. Philips Corporation (New York, NY)
Inventors: Germen K. Krikke (Hilversum), Hendrik Teule (Hilversum)
Primary Examiner: Thomas W. Brown
Attorneys: Algy Tamoshunas, Leroy Eason
Application Number: 7/320,728
Classifications
Current U.S. Class: 379/95; 379/94; Fraud Or Improper Use Mitigating Or Indication (e.g., "blue Box", "black Box") (379/189); 379/211
International Classification: H04M 166; H04M 1100;